Thumb

Management with adaptable practices

We denounce with righteous indige nation and dislike men who are so beguiled and demo realized by the charms of pleasure of the moment, so blinded by desire, that they cannot foresee the pain and trouble that are bound to ensue cannot foresee. These cases are perfectly simple and easy to distinguish. In a free hour, when our power of choice is untrammelled data structures manages data in technology.

Social Engineering Training Course Outline

Introduction to Social Engineering

Social Engineering Types

  • Email
  • Telephone
  • Baiting
  • Fax
  • Pretexting

Influencing Techniques

Overview of Elicitation

  • Flattery
  • False Statements
  • Artificial Ignorance
  • Sounding Board
  • Bracketing
  • Confidential Baiting

Basics of Pretexting

  • Research and Planning
  • Legal Considerations
  • Body Language

Information Gathering Basics

  • Information Organisation Overview
  • Dradis Framework
  • Sources of Information

Computer-Based and Physical Tools

  • Kali Linux
  • Social Engineering Toolkit (SET)
  • Metasploit Framework
  • Maltego
  • Cameras and GPS
  • Telephone and Lock Picking

Who should attend?

Anyone who wishes to enhance their knowledge of social engineering can attend this course. Professionals who wish to learn how to secure systems from social engineering attacks can also attend this course.

Prerequisites

There are no formal prerequisites for this course.

Social Engineering Training Course Overview

Social engineering refers to the art of manipulating people to gain access to confidential data for fraudulent purposes. It is a term used for a wide range of malicious activities accomplished through human interactions.

Because social engineering relies on human error rather than vulnerabilities in software and operating systems, it requires a different approach to traditional network security.

This Social Engineering course is designed to provide knowledge to defend against social engineering tricks. During this training, delegates will learn about various influencing techniques including reciprocity, scarcity, and likability.

They will also become familiarised with common elicitation techniques, as well as pretexting. By the end of the course, you will understand the various computer-based and physical tools of social engineering, including the Social Engineering Toolkit (SET).

What’s Included

  • The Knowledge Academy’s Social Engineering Training Manual
  • Experienced Instructor
  • Completion Certificate

BCS CISMP (Certificate in Information Security Management Principles) Exam Information

This BCS CISMP (Certificate in Information Security Management Principles) exam is formatted in the following way:

  • Type: Multiple Choice
  • Duration: 2 Hours
  • Supervised: Yes
  • Open Book: No
  • Total questions: 100
  • Pass Mark: 65/100 (65%)
4